The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Online social networks (OSNs) are immensely popular, but their centralized control of user data raises important privacy concerns. This paper presents Vis-à-Vis, a decentralized framework for OSNs based on the privacy-preserving notion of a Virtual Individual Server (VIS). A VIS is a personal virtual machine running in a paid compute utility. In Vis-à-Vis, a person stores her...
We present an accountability framework for the Internet which ties a user''s action to her identity on an online social network. The framework is optional in that users do not need to be accountable at all times, but various web services can force accountability on the part of their users by only allowing accountable users access. Our design is general enough that higher level applications can place...
New generations of video, voice, high-performance computing and social networking applications have continuously driven the development of novel routing technologies for higher packet forwarding speeds to meet the future Internet demand. One of the fundamental design issues for core routers is fast routing table lookup, which is a key problem at the network layer of the Internet protocol suite. It...
P2P SIP (peer to peer session initiation protocol) systems have emerged as a new trend in multimedia realm due to their abilities to overcome the shortcomings of conventional SIP systems. Most of P2P SIP systems were implemented using Chord, a Distributed Hash Table (DHT) based routing algorithm which can provide scalability and reliability. Previous studies on P2P SIP systems did not address node...
Recently, the traffic volume of HTTP video applications, such as YouTube, is rapidly growing on the Internet. To support the quality of service requirements of HTTP video applications, network carriers need to design bandwidth by taking into account the traffic volume of HTTP video applications. However, since most HTTP video applications are provided in a web browser, it is difficult to classify...
The following topics are dealt with: content-based image retrieval; mobile IP; ad hoc wireless networks; Internet routing scalability; wireless neutral access networks; service-oriented multi agent middleware; information fusion; MAC protocol; wireless sensor networks; QoS paradigm; file transfer service; mobile phones; avatars; virtual environments; VoIP; AQM routers; cloud SSO authentication; and...
The following topics are dealt with: data center; Internet networking; location sensing; RFID; clouds; grids; data streaming; querying; IP networks; system security; data management; network security; sensor networks; fault tolerance; routing; social networks; resource allocation; network coding; P2P; and wireless networks.
Social navigation and social tagging technologies enable user communities to assemble the collective wisdom, and use it to help community members in finding the right information. However, it takes a significantly-sized community to make a social system truly useful. The question addressed in this paper is whether collaborative information finding is feasible in the context of smaller communities...
This paper focuses on a generalization of stochastic Kronecker graphs, introducing a Kronecker-like operator and defining a family of generator matrices H dependent on distances between nodes in a specified graph embedding. We prove that any lattice-based network model with sufficiently small distance-dependent connection probability will have a Poisson degree distribution and provide a general framework...
The spread of high-quality, user-generated content across broadband networks is motivating even more users to share their content over well-known Internet social network services (SNSs). SNSs have attracted attention as possibly the most useful social network infrastructure. However, the capacities of SNS servers have limited the quality and available time for sharing content. In this paper, we propose...
The rapid evolution of the Internet has forced the use of Network Address Translation (NAT) to help slow the decline of publicly available IPv4 address space. While NAT provides the requisite address space as well as privacy and security to its users, it also eliminates the ability to establish incoming connections to devices within a private network.To address this issue, we propose combining social...
Instant messages and online chatting are the earliest forms of online social networking, and they remain as popular communication channels that people use to exchange information and socialize with each other through the Internet, even with the existence of the current diversified and various modern social networks such as mySpace and Facebook. This is especially the case for younger generations,...
This paper presents the pre-misses of a new modular framework and a large scale experiment that we will launch for social opportunistic networks. The new framework aims at activating specific protocols depending on the application requirements. The experiment involves several students who will be equipped with PDA. Our goal is to study how the social interaction between users impact the behavior of...
Public sentiment reflects the people's attitude to society and politics. Since Web public sentiment sees most similarity with social network, in this paper we use threelayers social network to analyze Web public sentiment, and we use relative centrality and potential center to find the key node and we propose a new solution for analyzing and predicting the public sentiment situation by applying the...
In this paper we introduce social VPNs, a novel system architecture which leverages existing social networking infrastructures to enable ad-hoc VPNs which are self-configuring, self-managing, yet maintain security against untrusted parties. The key principles in our approach are: (1) self-configuring virtual network overlays enable seamless bi-directional IP-layer connectivity among parties linked...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.